Switch from the old AES library functions (which use struct
crypto_aes_ctx) to the new ones (which use struct aes_enckey).  This
eliminates the unnecessary computation and caching of the decryption
round keys.  The new AES en/decryption functions are also much faster
and use AES instructions when supported by the CPU.

Note: aes_encrypt_new() will be renamed to aes_encrypt() once all
callers of the old aes_encrypt() have been updated.

Signed-off-by: Eric Biggers <[email protected]>
---
 drivers/crypto/amcc/crypto4xx_alg.c | 10 +++++-----
 1 file changed, 5 insertions(+), 5 deletions(-)

diff --git a/drivers/crypto/amcc/crypto4xx_alg.c 
b/drivers/crypto/amcc/crypto4xx_alg.c
index 38e8a61e9166..1947708334ef 100644
--- a/drivers/crypto/amcc/crypto4xx_alg.c
+++ b/drivers/crypto/amcc/crypto4xx_alg.c
@@ -489,23 +489,23 @@ static int crypto4xx_aes_gcm_validate_keylen(unsigned int 
keylen)
 }
 
 static int crypto4xx_compute_gcm_hash_key_sw(__le32 *hash_start, const u8 *key,
                                             unsigned int keylen)
 {
-       struct crypto_aes_ctx ctx;
+       struct aes_enckey aes;
        uint8_t src[16] = { 0 };
        int rc;
 
-       rc = aes_expandkey(&ctx, key, keylen);
+       rc = aes_prepareenckey(&aes, key, keylen);
        if (rc) {
-               pr_err("aes_expandkey() failed: %d\n", rc);
+               pr_err("aes_prepareenckey() failed: %d\n", rc);
                return rc;
        }
 
-       aes_encrypt(&ctx, src, src);
+       aes_encrypt_new(&aes, src, src);
        crypto4xx_memcpy_to_le32(hash_start, src, 16);
-       memzero_explicit(&ctx, sizeof(ctx));
+       memzero_explicit(&aes, sizeof(aes));
        return 0;
 }
 
 int crypto4xx_setkey_aes_gcm(struct crypto_aead *cipher,
                             const u8 *key, unsigned int keylen)
-- 
2.52.0


Reply via email to